A new ransomware program written in Windows PowerShell is being used in attacks against enterprises, including health care organizations, researchers warn.

PowerShell is a task automation and configuration management framework that's included in Windows and is commonly used by systems administrators. It has its own powerful scripting language that has been used to create sophisticated malware in the past.

The Carbon Black team found PowerWare when it targeted one of its customers: an unnamed healthcare organization. Multiple hospitals have recently fallen victim to ransomware attacks.

The malicious Word documents masqueraded as an invoice, the Carbon Black researchers said. When opened, it instructed users to enable Word editing and content, claiming that these actions were necessary to view the files.

If the malicious macro code is allowed to run, it opens the Windows command line (cmd.exe) and launches two instances of PowerShell (powershell.exe). One instance downloads the PowerWare ransomware from a remote server in the form of a PowerShell script and the other instance executes the script.

After this point, the infection routine is similar to that of other ransomware programs: The script generates an encryption key; uses it to encrypt files with specific extensions, including documents, pictures, videos, archives and source code; sends the key to the attackers' server and generates the ransom note in the form of an HTML file.

Based on the payment instructions, the attackers use the Tor anonymity network to hide their command-and-control server. The initial ransom is $500, but it goes up to $1,000 after a couple of weeks.

While PowerShell-based malware is not new, its use has increased in recent months and it is arguably harder to detect than traditional malware because of PowerShell's legitimate use and popularity, especially in enterprise environments.